개인정보보호를 위한 헬스케어 데이터 익명화

  • Published : 2017.02.17

Abstract

Keywords

References

  1. 개인정보보호종합포털, 개인정보 비식별조치 가이드라인, https://www.privacy.go.kr/nns/ntc/selectBoardArticle.do?nttld=7186
  2. ISO, ISO/TS 25237, Health informatics - Pseudonymization, 2008
  3. lHE (Integrating the Healthcare Enterprise), IHE IT Infrasture Handbook, De-Identification, 2014.
  4. U.S. Department of Health & Human Services, Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health lnsurance Portability and Accountability Act (HIPAA) Privacy Rule, 2012.
  5. Shin, S.-Y. Lyu, Y. Shin, Y. Choi, H. J. Park, J. Kim, W.-S. and Lee, J. H. "Lessons Leamed from Development of De-identification System for Biomedical Research in a Korean Tertiary Hospital," Healthc. Inform. Res, Vol. 19, No. 2, pp.102-109, 2013. https://doi.org/10.4258/hir.2013.19.2.102
  6. Shin, S.-Y. Park, Y. R. Shin, Y. Choi, H. J.Park, J. Lyu, Y. Lee, M. S. Choi, C. M. Kim, W. S. and Lee, J. H. "A De-identification Method for Bilingual Clinical Texts of Various Note Types," J. Korean Med. Sci, Vol 30, No. 1, pp.7-15, 2015. https://doi.org/10.3346/jkms.2015.30.1.7
  7. Choi, H. J. Lee, M. J. Choi, C.-M. Lee, J. Shin, S.-Y. Lyu, Y. Park, Y. and Yoo, S. "Establishing the role of honest broker: bridging the gap between protecting personal health data and clinical research efficiency," PeerJ, Vol. 3, No. e1506, 2015. https://doi.org/10.7717/peerj.1506
  8. Barth-Jones, D. C. "The 'Re-Identification' of Governor William Weld's Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now," SSRN: https://ssrn.com/abstract=2076397, July 2012
  9. Gymrek, M. McGuire, AL. Golan, D. Halperin, E. Erlich, Y. "IdentifYing personal genomes by surname inference," Science, Vol. 339, No. 6117, pp.321-324, 2013. https://doi.org/10.1126/science.1229566
  10. Barth-Jones, D. C. "NCVHS Hearing: De-identification and HIPAA,'' http://www.ncvhs.hhs.gov/wp-content/uploads/2016/04/BARTH-JONES.pdf, May 24, 2016.
  11. El Emam, K. Jonker, E. Arbuckle, L. Malin, B. "A systematic review of re-identification attacks on health data," PLoS One, Vol. 6, No. e28071, 2011. https://doi.org/10.1371/journal.pone.0028071
  12. El Emam, K. Arbuckle, L. Koru, G. Eze, B. Gaudette, L. Neri, E. Rose, S. Howard, J. Gluck, J. "De-identification methods for open health data: the case of the Heritage Health Prize claims dataset," J. Med. Intemet Res. Vol. 14, No. e33, 2012.
  13. Erlich, Y. Narayanan, A. "Routes for breaching and protecting genetic privacy," Nat. Rev. Genet. Vol. 15, No 6, pp.409-421, 2014. https://doi.org/10.1038/nrg3723